diff options
author | Tobias Stoeckmann <tobias@stoeckmann.org> | 2024-01-05 22:54:54 +0100 |
---|---|---|
committer | Dmitry V. Levin <ldv@strace.io> | 2024-01-05 23:36:44 +0000 |
commit | 94c798c2d82a3df4d1e98e0a6855d92a5a4b1450 (patch) | |
tree | b9a4f79eadb7376d6d9980e75cb01c4f3647c669 | |
parent | 387940a856bac59fb77d13572b504bf51cb1ed3b (diff) | |
download | pam-94c798c2d82a3df4d1e98e0a6855d92a5a4b1450.tar.gz pam-94c798c2d82a3df4d1e98e0a6855d92a5a4b1450.tar.bz2 pam-94c798c2d82a3df4d1e98e0a6855d92a5a4b1450.zip |
treewide: fix typos in comments
Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
-rw-r--r-- | libpam/include/security/_pam_macros.h | 2 | ||||
-rw-r--r-- | libpam/pam_audit.c | 2 | ||||
-rw-r--r-- | libpam/pam_dispatch.c | 2 | ||||
-rw-r--r-- | libpam/pam_end.c | 2 | ||||
-rw-r--r-- | libpam/pam_misc.c | 2 | ||||
-rw-r--r-- | modules/pam_env/pam_env.c | 2 | ||||
-rw-r--r-- | modules/pam_filter/pam_filter.c | 4 | ||||
-rw-r--r-- | modules/pam_namespace/pam_namespace.c | 2 | ||||
-rw-r--r-- | modules/pam_namespace/pam_namespace.h | 2 |
9 files changed, 10 insertions, 10 deletions
diff --git a/libpam/include/security/_pam_macros.h b/libpam/include/security/_pam_macros.h index e36f4023..01274428 100644 --- a/libpam/include/security/_pam_macros.h +++ b/libpam/include/security/_pam_macros.h @@ -49,7 +49,7 @@ do { \ } while (0) /* - * WARNING: Do NOT use this macro, as it does not reliable override the memory. + * WARNING: Do NOT use this macro, as it does not reliably override the memory. */ #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ diff --git a/libpam/pam_audit.c b/libpam/pam_audit.c index 97a9a929..5619ba0c 100644 --- a/libpam/pam_audit.c +++ b/libpam/pam_audit.c @@ -203,7 +203,7 @@ int _pam_audit_end(pam_handle_t *pamh, int status UNUSED) { if (! (pamh->audit_state & PAMAUDIT_LOGGED)) { - /* PAM library is being shut down without any of the auditted + /* PAM library is being shut down without any of the audited * stacks having been run. Assume that this is sshd faking * things for an unknown user. */ diff --git a/libpam/pam_dispatch.c b/libpam/pam_dispatch.c index d237e68d..60ec85bd 100644 --- a/libpam/pam_dispatch.c +++ b/libpam/pam_dispatch.c @@ -28,7 +28,7 @@ /* * walk a stack of modules. Interpret the administrator's instructions - * when combining the return code of each module. + * when combining the return codes of each module. */ static int _pam_dispatch_aux(pam_handle_t *pamh, int flags, struct handler *h, diff --git a/libpam/pam_end.c b/libpam/pam_end.c index c374dbca..c728f1da 100644 --- a/libpam/pam_end.c +++ b/libpam/pam_end.c @@ -26,7 +26,7 @@ int pam_end(pam_handle_t *pamh, int pam_status) _pam_audit_end(pamh, pam_status); #endif - /* first liberate the modules (it is not inconcevible that the + /* first liberate the modules (it is not inconceivable that the modules may need to use the service_name etc. to clean up) */ _pam_free_data(pamh, pam_status); diff --git a/libpam/pam_misc.c b/libpam/pam_misc.c index c91aa693..e379d2f9 100644 --- a/libpam/pam_misc.c +++ b/libpam/pam_misc.c @@ -206,7 +206,7 @@ size_t _pam_mkargv(const char *s, char ***argv, int *argc) /* * this function is used to protect the modules from accidental or - * semi-mallicious harm that an application may do to confuse the API. + * semi-malicious harm that an application may do to confuse the API. */ void _pam_sanitize(pam_handle_t *pamh) diff --git a/modules/pam_env/pam_env.c b/modules/pam_env/pam_env.c index 9604207a..a214593c 100644 --- a/modules/pam_env/pam_env.c +++ b/modules/pam_env/pam_env.c @@ -749,7 +749,7 @@ _check_var(pam_handle_t *pamh, VAR *var) return retval; } - /* Now its easy */ + /* Now it's easy */ if (var->override && *(var->override)) { /* if there is a non-empty string in var->override, we use it */ diff --git a/modules/pam_filter/pam_filter.c b/modules/pam_filter/pam_filter.c index 62b118bb..ed315b13 100644 --- a/modules/pam_filter/pam_filter.c +++ b/modules/pam_filter/pam_filter.c @@ -318,7 +318,7 @@ set_filter (pam_handle_t *pamh, int flags UNUSED, int ctrl, close(t); } - /* make this process it's own process leader */ + /* make this process its own process leader */ if (setsid() == -1) { pam_syslog(pamh, LOG_ERR, "child cannot become new session: %m"); @@ -468,7 +468,7 @@ set_filter (pam_handle_t *pamh, int flags UNUSED, int ctrl, } else if (chid == child2) { /* - * if the filter has exited. Let the child die + * if the filter has exited, let the child die * naturally below */ if (WIFEXITED(lstatus) || WIFSIGNALED(lstatus)) diff --git a/modules/pam_namespace/pam_namespace.c b/modules/pam_namespace/pam_namespace.c index 09d19ca0..2528cff8 100644 --- a/modules/pam_namespace/pam_namespace.c +++ b/modules/pam_namespace/pam_namespace.c @@ -473,7 +473,7 @@ static int parse_method(char *method, struct polydir_s *poly, * of the namespace configuration file. It skips over comments and incomplete * or malformed lines. It processes a valid line with information on * polyinstantiating a directory by populating appropriate fields of a - * polyinstatiated directory structure and then calling add_polydir_entry to + * polyinstantiated directory structure and then calling add_polydir_entry to * add that entry to the linked list of polyinstantiated directories. */ static int process_line(char *line, const char *home, const char *rhome, diff --git a/modules/pam_namespace/pam_namespace.h b/modules/pam_namespace/pam_namespace.h index a991b4c4..fd393d17 100644 --- a/modules/pam_namespace/pam_namespace.h +++ b/modules/pam_namespace/pam_namespace.h @@ -114,7 +114,7 @@ #define PAMNS_MOUNT_PRIVATE 0x00080000 /* Make the polydir mounts private */ /* polydir flags */ -#define POLYDIR_EXCLUSIVE 0x00000001 /* polyinstatiate exclusively for override uids */ +#define POLYDIR_EXCLUSIVE 0x00000001 /* polyinstantiate exclusively for override uids */ #define POLYDIR_CREATE 0x00000002 /* create the polydir */ #define POLYDIR_NOINIT 0x00000004 /* no init script */ #define POLYDIR_SHARED 0x00000008 /* share context/level instances among users */ |